Unable to handle kernel paging request at virtual address ffff0002caa9bbf8 Mem abort info: ESR = 0x0000000096000005 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: level 1 translation fault Data abort info: ISV = 0, ISS = 0x00000005 CM = 0, WnR = 0 swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000001c566b000 [ffff0002caa9bbf8] pgd=180000023fff8003, p4d=180000023fff8003, pud=0000000000000000 Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 26397 Comm: syz-executor.2 Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : dbNextAG+0x90/0x1c8 fs/jfs/jfs_dmap.c:618 lr : dbNextAG+0x68/0x1c8 fs/jfs/jfs_dmap.c:617 sp : ffff800020fe3610 x29: ffff800020fe3610 x28: 0000000000000040 x27: 0000000000000000 x26: ffff000116922300 x25: ffff00011f659000 x24: 0000000035688578 x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000 x20: 00000000001f0000 x19: ffff00011f659450 x18: ffff800020fe3840 x17: 0000000000000000 x16: ffff80000db49158 x15: ffff000116884f80 x14: 0000000000000190 x13: 00000000ffffffff x12: ffff000116884f80 x11: ff80800008d42f10 x10: 0000000000000000 x9 : ffff000116884f80 x8 : ffff0002caa9bbc0 x7 : ffff800008d42eec x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 x2 : ffff000116884f80 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: dbNextAG+0x90/0x1c8 fs/jfs/jfs_dmap.c:618 diAlloc+0xd4/0x98c fs/jfs/jfs_imap.c:1365 ialloc+0x5c/0x2fc fs/jfs/jfs_inode.c:56 jfs_create+0xf8/0x488 fs/jfs/namei.c:92 lookup_open fs/namei.c:3413 [inline] open_last_lookups fs/namei.c:3481 [inline] path_openat+0x804/0x11c4 fs/namei.c:3688 do_filp_open+0xdc/0x1b8 fs/namei.c:3718 file_open_name fs/open.c:1258 [inline] filp_open+0x104/0x144 fs/open.c:1278 do_coredump+0xd98/0x10a0 fs/coredump.c:697 get_signal+0x7c4/0xb40 kernel/signal.c:2843 do_signal+0xd4/0x438 arch/arm64/kernel/signal.c:1071 do_notify_resume+0xc0/0x1f0 arch/arm64/kernel/signal.c:1124 prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:137 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:142 [inline] el0_da+0xb8/0x16c arch/arm64/kernel/entry-common.c:515 el0t_64_sync_handler+0xcc/0xf0 arch/arm64/kernel/entry-common.c:657 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 Code: 97d5733b 1400000f 93407f08 8b080f28 (f9401d16) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 97d5733b bl 0xffffffffff55ccec 4: 1400000f b 0x40 8: 93407f08 sxtw x8, w24 c: 8b080f28 add x8, x25, x8, lsl #3 * 10: f9401d16 ldr x22, [x8, #56] <-- trapping instruction